Legend:

Note: the "how" documents have not been fully updated to include several changes including the new tunnel routing and encryption algorithms, addressing several issues (with the groundwork for addressing others), and other changes.

1

==HOW DOES I2P WORK?==

2

3

Note: the "how" documents have not been fully updated to include several changes including the new tunnel routing and encryption algorithms, addressing several issues (with the groundwork for addressing others), and other changes.

2

4

3

5

I2P is an effort to build, deploy, and maintain a network to support secure and anonymous communication. People using I2P are in control of the tradeoffs between anonymity, reliability, bandwidth usage, and latency. There is no central point in the network on which pressure can be exerted to compromise the integrity, security, or anonymity of the system. The network supports dynamic reconfiguration in response to various attacks, and has been designed to make use of additional resources as they become available. Of course, all aspects of the network are open and freely available.